Systems | Development | Analytics | API | Testing

What Is Sound Static Analysis?

Sound static analysis is a beneficial practice when developing software that needs to be safe, secure, and compliant. Here we discuss what makes sound analysis different, in terms of static analysis, why it is important, and how sound static code analysis works. Read along or jump ahead to the section that interests you the most: ➡️ Sound static analysis Free Trial.

Netlify Identity protects Ably apps from hacks

A few weeks ago I saw this message in our internal support channel on Slack, and it made my gears grind. So I stopped to take a look, since the last thing we want is a customer taken advantage of. There are people out there on the internet cheeky enough to freeload off your account, and use up your monthly quotas. What's more: you may not know that it is happening.

API Security In an Agile World: Here's What You Need to Know

The rise of web services creates many challenges that companies must address to avoid data breaches. Companies are embracing the power of APIs to extend their business capabilities. However, they began adopting them so quickly, security didn’t get as much attention as it deserved. Many organizations are now taking a strong look at API security to avoid being the next victim of a data breach. Here’s our take on security and what you can do to address it in your company.

A Guide to Secure Elixir Package Updates

Keeping your dependencies up-to-date is essential to ensure that your applications stay healthy, secure, and performant. Thankfully, the BEAM ecosystem has its own package manager, Hex, which is fast, mature, and simple to use. This article explores the available tools and commands to manage Hex dependencies and some tips to make the process more enjoyable. Let's dive in!

What the heck is DPoP? | IAM Community Meetups - 2022

An Application-level proof-of-possession protections for access and refresh tokens. DPoP (Demonstrating-Proof-of-Possession) is an additional security mechanism for the token generation which overcomes the issue of bearer token which will not validate between who is requested token and who is actually using the token for the access of a particular resource. In DPoP, this will be avoided by validating the client who requested the token is the one who is actually using the token using the Signed JWT tokens known as DPoP Proof.

The Importance of Compliance Risk Assessments

In a world that’s literally had to define a new normal, standards and rules around safety and quality have been scrutinized more than ever before. And that new reality is affecting standard operations for some industries. While the importance of compliance has not changed, the complexity of it may have. Considering how quickly we continue advancing, this increasing complexity may also be part of our new normal. If you’ve not updated your compliance management lately, now may be a good time.

Monitoring Appian with Appian: Automating Threat Analysis and Information Gathering

In our previous blog posts covering our in-house Security Orchestration, Automation & Response (SOAR) application, we described the basic building blocks for the system and the steps we took to orchestrate interactions between a number of security tools. While building orchestration, we already introduced a significant amount of Automation powering features like threat intelligence collection and event polling.

Playing Offense Against Ransomware with a Modern Data Infrastructure

Has your company faced a ransomware attack yet? If not, count yourself lucky, for now. A June 2021 article in Cybersecurity Ventures predicts that ransomware will cost its victims approximately $265 billion annually by 2031. And, according to CRN, “Victims of the 10 biggest cyber and ransomware attacks of 2021 were hit with ransom demands totaling nearly $320 million.”